Member since
08-01-2013
187
Posts
10
Kudos Received
8
Solutions
My Accepted Solutions
Title | Views | Posted |
---|---|---|
2213 | 09-01-2016 09:26 PM | |
1903 | 10-14-2015 07:31 AM | |
2058 | 06-21-2015 06:02 PM | |
3736 | 02-26-2015 04:36 PM | |
4219 | 02-18-2015 12:18 AM |
02-18-2015
12:18 AM
1 Kudo
You may be hitting YARN-2964 which is current limitation of getting delegation toke over llama. To prevent the error, you should implement the following configurations. Configuring YARN for Long-running Applications http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_sg_yarn_long_jobs.html
... View more
02-17-2015
04:55 AM
Thanks for the information! Hmm, I have never met such kinds of problem, but I don't think the change you did will break the other finctionalities. Daisuke
... View more
02-17-2015
02:43 AM
2 Kudos
Hi zero, It appears that there's a mismatch of encryption types between clients and the KDC server. Please follow the below steps and see if it helps. 1. Stop the ZooKeeper service through CM (Note that you need to stop entire cluster). 2. Go to CM --> Administration --> Kerberos --> 'Kerberos Encryption Types', then add the following encryption types: aes256-cts aes128-cts des3-hmac-sha1 arcfour-hmac des-hmac-sha1 des-cbc-md5 des-cbc-crc 3. Do deploy krb5.conf through CM, and try to start the ZooKeeper Service.
... View more
02-17-2015
02:34 AM
http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topics/cm_mc_hive_udf.html will help.
... View more
02-16-2015
09:46 PM
Before you do try mine, please uninstall krb5-server and krb5-workstation packages.
... View more
02-16-2015
09:45 PM
The original script Eric Sammer wrote up used to be working when CM didn't have the wizard which enables Kerberos. I made some changes with his. Please use mine instead and specify the password as cloudera in the wizard. See also the step 7 in my github page. https://github.com/daisukebe/krb-bootstrap daisukebe has changed the behavior for configuring Kerberos with Cloudera Manager 5.1 (and above). Then this script just generates a principal as cloudera-scm/admin for CM with a password as 'cloudera'.
... View more
02-16-2015
04:41 PM
Kerberos (KDC) is not included with the VM, but you can easily configure KDC server by yourself in the VM. I usually run krb-bootstrap for this kinds of test purpose: https://github.com/daisukebe/krb-bootstrap.
... View more
02-16-2015
04:10 PM
Sentry is a service for strong authorization over Hadoop cluster, so that the cluster needs to be strongly authenticated using Kerberos or LDAP before you integrate Sentry.
... View more
02-15-2015
05:09 PM
3 Kudos
Hi Jason, This might be due to the mismatch of encryption types between clients and the KDC server. Please follow the below steps and see if it helps. 1. Stop the cluster through CM 2. Go to CM --> Administration --> Kerberos --> 'Kerberos Encryption Types', then add the following encryption types: des3-hmac-sha1 arcfour-hmac des-hmac-sha1 des-cbc-md5 des-cbc-crc 3. Do redeploy krb5.conf through CM, and restart the cluster. Daisuke
... View more
- « Previous
- Next »